Author:
Mostaghim Melika,Boostani Reza
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis;International Journal of Information Security;2024-05-05
2. Evaluating the Merits and Constraints of Cryptography-Steganography Fusion: A Systematic Analysis;2023-07-21
3. Enhanced Visual Cryptography Using Quadratic Anisotropic Diffusion;2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU);2023-03
4. Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key;2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI);2022-11-06
5. Hybrid Approach to Enhance Security and Friendliness of Visual Secret Sharing Scheme;2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22);2022-04-29